In the following video from Learn Security Online they show you how to compromise / hack Microsoft Terminal Services doing password cracking using Tsgrinder, TScrack and Rdesktop.I'm not recommending you hack terminal services but it is important to understand what other malicious hackers can do to your system and thus you can protect yourself against it.Terminal Services is not the problem...

Ant TSGrinderi have coded a program Called AntiGrinder 2.0.once you install this on your server, you have to change the Remote Desktop Port to a diffrent port let's say we would change it to, 5555, now you can still connect to your sevrer using hostname:5555 in RDP, once this has been done, you can run my program AntiGrinder, and everytime someone tries to attack your server AntiGrinder will Tunnel the attackes and send them right back to the attackers Computer, or you have a choice of redirecting the attack to a router so its blocked.This program has been tested and works F*** Awesome. this software almost acts as a proxy sevrer to redirect SPD connctions, thus making the attacker a moron cause once the attacker starts to attack my sevrer all the attacks are redirected back to his server. so the attacker thinks he is attacking you, when in reality he is atacking himself, and when redirecting the packets back to the attacker it is invisible, and do not shoe up in the log file due the features of AntiGrinder.HAHAHA LOOSERS. want a copy email viruz_man@hotmail.com

CAN SOME ONE HELP ME Hi i would like to know how people Hack the virtual server in case their is a internal IP en coated that is IF their is HUB and a split of Slaves where the Hub is connected with a Master storage top The question is will the master storage have the same sink of IP or a different one

You should never have TS open to the public Internet. It doesn't matter how complex you make your passwords. It's only a matter of time.

The sad part is, THIS IS WHY VPN WAS CREATED!!! Start using one and do not ever open any port to your internal network EVER!

One person wrote "On a network where the admin account was renamed". I see many networks where the email alias is the same as the user ID. Basically the same poeple renaming the administrator then turn around and transmit their user IDs via email all over the world.

this is illegaleyou guys should not put that kind of stuff on the web cuse there is so many sick people who would like to get this kind of information to do whatever they want to do you guys seems to encourage violation of servers and all.

I disagree. The problem needs to be understood so people stop it. If there is a way to hack there is a way to block it. If people come to dabcc.com to learn TS then they should see things like this so they can stop it. Heck, the hackers know how to do it and they know where to find the info if they need it. It is called, "Google"... So, by posting this maybe someone will read it and close the hole. know what I mean?

Not crapI've been to too many networks with blank or simple passwords. Is this going to work everywhere, no. Will it work sometimes, yes. Also, as the video shows nmap the port with the -sV flag should get you the version number.

Terrible articleOk it shows how to hack a TS. Sorry but if you want to convince me this is actually doable, get a TS properly configured, on a network where the administrator is smart enough to rename the administrator account AND to use a complex password (usually a passphrase like !Il0veW0rkingH3r3!). Secondly, load something like SecureRDP on the TS and filter by client version (one chance in 10,000 the hacker knows the client version). And finally have something like RecordTS loaded to record all activity and I can guarantee you this TS will NOT be hacked at all.
Crap demo IMHO.